Analysis

  • max time kernel
    151s
  • max time network
    147s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    28-11-2022 03:51

General

  • Target

    ec2f9735aea37282eea523010329322725fcb46bd7ac9acb645afdc2ac7e6631.dll

  • Size

    274KB

  • MD5

    bcb9c54e49ecde50533e6f3c8edbaef2

  • SHA1

    ff318d96b72846667e41bf76d03c566d894b0836

  • SHA256

    ec2f9735aea37282eea523010329322725fcb46bd7ac9acb645afdc2ac7e6631

  • SHA512

    fc00fd1f9f99ea872ca700bb1b0d5e9c43574aa00aa9b73e301a66784417928da0887d3aabfc6c201cf306baa3264a1aec278c5b091a43e41402ef67ee7a9a90

  • SSDEEP

    6144:83wCNXbCIF4l93ymOxb0UGsjkLqnbm8pT:83w6jWbcF1GCli8pT

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer Protected Mode 1 TTPs 15 IoCs
  • Modifies Internet Explorer Protected Mode Banner 1 TTPs 3 IoCs
  • Modifies Internet Explorer settings 1 TTPs 38 IoCs
  • Modifies registry class 5 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of FindShellTrayWindow 12 IoCs
  • Suspicious use of SetWindowsHookEx 4 IoCs
  • Suspicious use of WriteProcessMemory 29 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\ec2f9735aea37282eea523010329322725fcb46bd7ac9acb645afdc2ac7e6631.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:816
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\ec2f9735aea37282eea523010329322725fcb46bd7ac9acb645afdc2ac7e6631.dll,#1
      2⤵
      • Modifies Internet Explorer Protected Mode
      • Modifies Internet Explorer Protected Mode Banner
      • Modifies Internet Explorer settings
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:884
      • C:\Windows\SysWOW64\explorer.exe
        explorer.exe
        3⤵
          PID:1552
        • C:\Windows\SysWOW64\notepad.exe
          notepad.exe
          3⤵
          • Modifies Internet Explorer Protected Mode
          • Modifies Internet Explorer Protected Mode Banner
          • Modifies Internet Explorer settings
          • Suspicious behavior: EnumeratesProcesses
          PID:960
        • C:\Windows\SysWOW64\notepad.exe
          notepad.exe
          3⤵
          • Modifies Internet Explorer Protected Mode
          • Modifies Internet Explorer Protected Mode Banner
          • Modifies Internet Explorer settings
          • Suspicious behavior: EnumeratesProcesses
          PID:1820
    • C:\Windows\explorer.exe
      C:\Windows\explorer.exe /factory,{682159d9-c321-47ca-b3f1-30e36b2ec8b9} -Embedding
      1⤵
      • Modifies Internet Explorer settings
      • Modifies registry class
      • Suspicious use of WriteProcessMemory
      PID:1424
      • C:\Windows\system32\ctfmon.exe
        ctfmon.exe
        2⤵
        • Suspicious use of FindShellTrayWindow
        PID:1604
    • C:\Program Files\Internet Explorer\iexplore.exe
      "C:\Program Files\Internet Explorer\iexplore.exe" -Embedding
      1⤵
      • Modifies Internet Explorer settings
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:1564
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1564 CREDAT:275457 /prefetch:2
        2⤵
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:1196

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\Q1U0MACF.txt

      Filesize

      603B

      MD5

      a6c916392b8b648951bb24c83bbfed3f

      SHA1

      7ed1aa4cd832945ad1ca7e272ced3112c067c564

      SHA256

      cf3a0f284489205d51143a7d750cee19e5abc87d0652864535f2fa2d9d1871e6

      SHA512

      25328bd011004a0866ee54ff920590daa74390dffb630638d5c4cb00a5934c289c30b3edcbf1c6e8643d77880a90865293c8948bfdf1d4a67b7c2308c375b81f

    • memory/884-62-0x00000000007F0000-0x0000000000822000-memory.dmp

      Filesize

      200KB

    • memory/884-55-0x0000000075DF1000-0x0000000075DF3000-memory.dmp

      Filesize

      8KB

    • memory/884-57-0x0000000000730000-0x0000000000777000-memory.dmp

      Filesize

      284KB

    • memory/884-58-0x00000000007F0000-0x0000000000822000-memory.dmp

      Filesize

      200KB

    • memory/884-59-0x00000000007F0000-0x0000000000822000-memory.dmp

      Filesize

      200KB

    • memory/884-60-0x00000000007F0000-0x0000000000822000-memory.dmp

      Filesize

      200KB

    • memory/884-56-0x00000000006F0000-0x0000000000722000-memory.dmp

      Filesize

      200KB

    • memory/884-79-0x00000000007F0000-0x0000000000822000-memory.dmp

      Filesize

      200KB

    • memory/884-61-0x00000000007F0000-0x0000000000822000-memory.dmp

      Filesize

      200KB

    • memory/960-80-0x0000000001E10000-0x0000000001E42000-memory.dmp

      Filesize

      200KB

    • memory/960-73-0x0000000001E10000-0x0000000001E42000-memory.dmp

      Filesize

      200KB

    • memory/960-71-0x0000000000770000-0x00000000007A2000-memory.dmp

      Filesize

      200KB

    • memory/960-72-0x00000000007B0000-0x00000000007F7000-memory.dmp

      Filesize

      284KB

    • memory/1424-68-0x000007FEFB731000-0x000007FEFB733000-memory.dmp

      Filesize

      8KB

    • memory/1424-70-0x0000000003A40000-0x0000000003A50000-memory.dmp

      Filesize

      64KB

    • memory/1552-67-0x0000000074041000-0x0000000074043000-memory.dmp

      Filesize

      8KB

    • memory/1820-77-0x0000000000490000-0x00000000004D7000-memory.dmp

      Filesize

      284KB

    • memory/1820-76-0x0000000000450000-0x0000000000482000-memory.dmp

      Filesize

      200KB

    • memory/1820-78-0x0000000000620000-0x0000000000652000-memory.dmp

      Filesize

      200KB

    • memory/1820-81-0x0000000000620000-0x0000000000652000-memory.dmp

      Filesize

      200KB